Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Hackers use Google to find website vulnerabilities
Agence France Presse ^ | Feb 22, 2008

Posted on 02/23/2008 12:30:32 PM PST by george76

Infamous computer hacker group Cult of the Dead Cow (CDC) said Friday it is offering a software tool that lets people use Google to scan websites for security flaws.

CDC says a "Goolag Scanner" program based on work done by a hacker using the name "Johnny I Hack Stuff" is available for free download at its website.

The tool lets people with fundamental programming skills check websites or Internet domains for weaknesses that could be exploited by hackers, according to CDC.

The group said it uncovered "some pretty scary holes" through random tests of the tool in North America, Europe, and the Middle East.

Computer security specialists warn people to make certain any programs they download onto their computers don't contain malicious code.

Hackers routinely try to trick people into installing programs that then take over machines or mine them for passwords, financial accounts, or other valuable information.

(Excerpt) Read more at news.yahoo.com ...


TOPICS: Crime/Corruption; Foreign Affairs; War on Terror
KEYWORDS: cdc; corruption; fbi; google; googlenews; hacker; hackers; nsa
Navigation: use the links below to view more comments.
first 1-2021-30 next last

1 posted on 02/23/2008 12:30:33 PM PST by george76
[ Post Reply | Private Reply | View Replies]

To: ShadowAce; SunkenCiv

Cult of the Dead Cow (CDC)


2 posted on 02/23/2008 12:31:35 PM PST by george76 (Ward Churchill : Fake Indian, Fake Scholarship, and Fake Art)
[ Post Reply | Private Reply | To 1 | View Replies]

To: george76

Hacker names were cooler in the 1980’s. Think: Farmers of Doom.


3 posted on 02/23/2008 12:32:52 PM PST by Southack (Media Bias means that Castro won't be punished for Cuban war crimes against Black Angolans in Africa)
[ Post Reply | Private Reply | To 1 | View Replies]

To: george76

Nice, hopefully site admins will make use of tools like this to find and remove security holes in their sites.


4 posted on 02/23/2008 12:33:17 PM PST by AnotherUnixGeek
[ Post Reply | Private Reply | To 1 | View Replies]

To: Southack
Hacker names were cooler in the 1980’s. Think: Farmers of Doom.

Pretty sure CDC has been around since the '80s.
5 posted on 02/23/2008 12:35:00 PM PST by AnotherUnixGeek
[ Post Reply | Private Reply | To 3 | View Replies]

To: george76
Crazy bunch they are. Years ago they had an IRCd running. I don't know about now.
I went there once to check it out. Reading their /MOTD was enough for me. Never went back.
Bad bunch.
6 posted on 02/23/2008 12:37:19 PM PST by Fiddlstix (Warning! This Is A Subliminal Tagline! Read it at your own risk!(Presented by TagLines R US))
[ Post Reply | Private Reply | To 1 | View Replies]

To: george76

Locating the flaws individually through Google has been around for years, lots of locations offer the individual search queries to find the vulnerabilities.

Don’t consider this as anything more than a small escalation of a long running cat and mouse game.


7 posted on 02/23/2008 12:37:51 PM PST by JerseyHighlander
[ Post Reply | Private Reply | To 1 | View Replies]

To: george76

Wow.
CDC has been around for a long time. I thought they disbanded years ago.
I actually know one of he old members who went but “Sid Vicious” (well, I knew him online via IRC in the early days). He disappeared years ago or so I thought. They are in some part responsible for the heavy push really early on with the MP3 format. They didn’t invent it or anything, but they were a big part in it’s popularity in the first days.


8 posted on 02/23/2008 12:51:32 PM PST by FunkyZero
[ Post Reply | Private Reply | To 2 | View Replies]

To: george76

Times have changed since these black hats were picking zits and decompiling code. Nowadays with terrorist threats and international electronic corporate espionage, circumventing cyber-security can get you many years in the big house. Ain’t Kevin Mitnick’s playground anymore.


9 posted on 02/23/2008 12:55:05 PM PST by SpaceBar
[ Post Reply | Private Reply | To 1 | View Replies]

To: george76

lol, I have heard of “Johnny I Hack Stuff” He has a site called g2p.org that lets you get mp3’s thru a proxy using search terms. Copy and paste this search in google........intitle:index.of +”last modified” +”parent directory” +(mp3|wma|ogg) +”Pink Floyd” -htm -html -php -asp......


10 posted on 02/23/2008 12:58:12 PM PST by meanie monster
[ Post Reply | Private Reply | To 1 | View Replies]

To: Southack

SwampRatty used to be numero uno at CDC in the late 80s and 90s


11 posted on 02/23/2008 1:03:45 PM PST by xtinct (I was the next door neighbor kid's imaginary friend.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: george76

Lynch all hackers...NOW!


12 posted on 02/23/2008 1:10:10 PM PST by JimRed ("Hey, hey, Teddy K., how many girls did you drown today?" TERM LIMITS, NOW!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: meanie monster; george76

How-to find interesting video, sound and image files in unprotected directories:

http://www.googletutor.com/2005/04/15/voyeur-heaven/


13 posted on 02/23/2008 1:19:18 PM PST by USF (I see your Jihad and raise you a Crusade)
[ Post Reply | Private Reply | To 10 | View Replies]

To: george76

Thanks george76.

http://www.cultdeadcow.com/

http://www.goolag.org/
http://www.goolag.org/download.html

http://www.secguru.com/link/goolag_scanner


14 posted on 02/23/2008 1:30:57 PM PST by SunkenCiv (https://secure.freerepublic.com/donate/___________________Profile updated Tuesday, February 19, 2008)
[ Post Reply | Private Reply | To 1 | View Replies]

To: george76

Go to a known hacker site and download something?

Makes sense to me!


15 posted on 02/23/2008 1:45:18 PM PST by DBrow
[ Post Reply | Private Reply | To 1 | View Replies]

To: USF

Thank you...


16 posted on 02/23/2008 1:46:28 PM PST by meanie monster
[ Post Reply | Private Reply | To 13 | View Replies]

To: george76
Pretty cool scam

Go to a hackers site

Hmmmm, good idea

Fresh meat for the hacker

No thanks

17 posted on 02/23/2008 1:47:12 PM PST by Syncro
[ Post Reply | Private Reply | To 1 | View Replies]

To: DBrow

Searching google does not make you a hacker.


18 posted on 02/23/2008 1:48:38 PM PST by meanie monster
[ Post Reply | Private Reply | To 15 | View Replies]

To: SunkenCiv

Dead Fish Society


19 posted on 02/23/2008 1:51:54 PM PST by gitmo (From now on, ending a sentence with a preposition is something up with which I will not put.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: gitmo

Alewives?


20 posted on 02/23/2008 2:25:39 PM PST by SunkenCiv (https://secure.freerepublic.com/donate/___________________Profile updated Tuesday, February 19, 2008)
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-30 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson